Descriptive Statistics

 

Instructions

You are to design an app for diversity awareness.

In order to analyze what to put in it, as well as to launch a marketing/sales plan you got a hold of a data set that indicates racial composition and diversity index for all counties in the US and their states. The dataset you need to work with it for this homework is attached (csv file).

  1.  Obtain the descriptive statistics (quartiles) and the average diversity index for CA and for IL.
  2. Also, obtain the descriptive statistics (quartiles) and mean of the Mixed Race population in NY and CA
  3. Using a histogram, show the distribution of diversity index in IL and in CA (Show the histogram)
  4. Based on your observations, what can you infer is different between the two states? Look at Cook County and other counties downstate. Does that help explain the different histograms? 
  5. In which states are the top counties with the largest Hispanic population? and the counties with the largest White alone population? Where are the counties with the largest mixed population?. This question asks you to look at the country as a whole, not at a state by state level. Respond by looking at the top 10 counties and show the state with the most counties in that list.
  6. Do CA and AK have a different diversity index? (i.e. does one have a significantly greater diversity index than the other?) Hint: look at the p-values
  7. Do CA and IL have a different diversity index? Hint: same as above
  8. Do IL and WY have a different diversity index? Hint: same as above.
  9. Are these results intuitive? Explain them using histograms and/or boxplots

Your work must comply with the following:

  • All questions answered in order. Please put the question number next to the answer
  • Answer the questions sequentially.

help with study guide

 

For this assignment, you are to become the teacher. But, you have a monumental task before you. You have a limited time to teach prospective students about each aspect of the core areas of the program. As a reminder, those core areas are:

• Networking • Databases • Systems Analysis • Management Information Systems • Project Management • Business Intelligence

Each core area outlined above has an associated Goal:

• Networking: Students will design scalable, robust, network solutions to address business/organizational needs.

• Databases: Students will design scalable, robust, database solutions to address business/organizational needs.

• Systems Analysis: Students will develop appropriate solutions to address business/organizational needs utilizing systems development methodologies.

• Management Information Systems: Students will evaluate appropriate information technologies to support the strategic and operational goals of an organization.

• Project Management: Students will apply project management concepts to solve business/organizational needs.

• Business Intelligence: Students will evaluate business intelligence solutions to leverage against business/organizational needs.

Unit 8.1 DB: Networking Administrator Skills

Research Network Administrator positions, assess the required skills, and explain why you feel they are important to have in this field. With your peers, discuss two other skills and why you feel that employers are seeking employees with these skills. 

1 page apa format

Computer Science Matlab Assignment

Please read the question on the screenshot provided. I will provide more file needed for the assignment. It is a Matlab assignment. It should not take longer than one hour since only basic coding is required.

Discussion

 

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Do not double space.

computer

 Imagine you are an information security manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online that discuss the security risks related to cloud-based computing and storage. One that stood out was Cloud Computing Risk Assessment: A Case Study. You are asked to summarize the information you can find on the Internet and other available sources. The CIO wants to have a firm grasp on the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems should be monitored to ensure proper usage and data security. 

Discussions: ITS-833: Information Governance (Information Governance Metrics, Information Governance and Information Technology Functions)

Discussion1 – Information Governance Metrics

Word count: 300+ words

In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management steps is to develop metrics and measure results. From your required readings, discuss the value that metrics bring to the organization, and identify critical measures of success that should be tracked.

* Share an applicable personal experience


* Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)


*  At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post


Discussion 2: Information Governance and Information Technology Functions

Word count: 300+ words

In chapter seven (7), we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”

Based on the company you have identified for your Final Paper, discuss 1) the data that matters to the executives in that industry, 2) who, within that industry, needs that data, and 3) some methods for ensuring that the critical data gets into the users’ hands.  Remember to respond to two other learners’ posts, letting them know if they missed any data or details in their industry.

* Share an applicable personal experience


* Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)


*  At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post
.

Textbook: 

For this assignment, please read chapters 6,7,10, and Appendix B from the below textbook.

Chapter 6: Information Governance Policy Development

Chapter 7 – IG for Business Units

Chapter 10 – Information Governance and Information Technology Functions

Appendix B: Laws and Major Regulations Related to Records Management

Title: Information Governance, ISBN: 9781118421017 Authors: Robert F. Smallwood Publisher: John Wiley & Sons Publication Date: 2014-03-28

Note: plagiarism check required, APA7 format, include References, within 8hrs

Please provide discussions in separate documents.

Risk Assessment Report

· Conduct a risk assessment on the network in Figure 1 of the attached document, based on the ISO 27005 standard.

· Write a detailed risk assessment report (in the required structure as detailed in the attached document). 

Summary Reaction 2

 I would like a summary and your reaction/opinion on each paper. Please identify the summary section with a heading, and the reaction section with a heading. It is becoming increasingly difficult to tell when some of you are making the summary-to-reaction transition.

The papers are:

Paper 1: Dabek, Frank, et al. “Event-driven programming for robust software.” Proceedings of the 10th workshop on ACM SIGOPS European workshop. 2002.

Paper 2: Rob von Behren, Jeremy Condit, and Eric Brewer, Why Events Are A Bad Idea (for high-concurrency servers), Workshop on Hot Topics in Operating Systems, 2003.

CYBERSECURITY

 

examine rules governing the protection of human when participating in research, and to look at and explain the cybersecurity culture

  • Explain the cybersecurity culture
  • Describe and explain the IRB process
  • Identify technologies to log, monitor and audit networks and systems